`
UK Sales: 0330 1340 230

Latest News

20/10/2021
by Paul Heritage

Check the latest blogs and updates from SonicWall-Sales.com

Cybersecurity during a pandemic

26/11/2020
by Paul Heritage

Unfortunately, just because the world is in the midst of a pandemic does not mean that cyber-attacks cease.

On the contrary.

We typically find an increase in the volume of cyber-attacks as they use vulnerability and fear to their advantage.

Cybersecurity during COVID 19 has seen business across all industries, tested. With reports of significant increases in malicious activity volume, exploiting the pandemic, and using uncertainty as a driver for a cyber-attack opportunity.

Cybersecurity during a pandemic

Phishing attacks are currently the most common cyber threats businesses, and individuals face. These and official-looking, specially designed apps that promote virus tracking maps, where once users click on these apps and data, their computers and phones are instantly infected with malicious software.

Plus, with more and more people now working from home than ever before, and potentially using their own devices and personal systems; the level of protection and security setup may not be as high as what endpoints at work are.

With an increase in the scope and severity of cyber-attacks since March and a marked increase in remote desktop protocol exploitation, we need to continue to educate ourselves and our teams about the reality of cyber threats, what to look out for, and how to stay safe online.

So, now that we have everyone paranoid about downloading malicious content onto their smartphones or computers, below we've highlighted in our cybersecurity guide some best practice security tips to help keep your networks and systems safe.

Keeping security high while working through a new `normal`

Top tips to stop a cyber-attack from reaching your systems:

Be wary of unknown or unexpected emails – even if the email looks as if it has come from a friend, make sure to check these emails out, looking specifically at their email address to make sure they haven't been spoofed!

Verify the email address – check out the sender's email address – may be the start of the email address looks official, but how does it end? Aol.com? Or maybe there's a slight spelling mistake in there somewhere to throw you off the scent. Get ready to do some proofreading!

Ransomware attacks are luring people using COVID 19 – these must be stopped by using firewall software like SonicWall firewall systems and backing up your data regularly.

Never open an unknown attachment – this is one of the first rules we all have drummed into us when using emails. Opening malicious PDF files is one of the most common forms of cyber-attacks used against businesses. Make sure to always know where your attachments are coming from and never open an attachment from an unknown sender.

Tread with caution when an email states it requires urgent attention – beware of the emails where you need to click on a link because new details have come to light regarding COVID, or where you have to subscribe with your personal details just to receive an announcement. These types of emails should all set alarm bells ringing that this is a potential scam!

Be wary of embedded links – always use official websites and navigate to the page from here rather than clicking the link embedded in the email.

Be careful of the increase in distributed denial of service (DDOS) attacks as more users try to access remote systems simultaneously. To help, companies should look to increase bandwidth allocations, disable any unused services, and discourage the streaming of videos and music, etc.

Only use your work laptop to access work and your company's network and systems. Using only the approved, secure remote access connection that has been provided.

Don't disable security features such as anti-malware or, indeed, your firewalls! And ensure all passwords and credentials are secure, and please don't reuse the same password across multiple accounts.

Signs you have fallen victim to a cyber-attack

There are a few signs that may indicate if your computer has fallen foul of a cyber-attack. If you feel any of the below applies to you, we'd advise you to speak with your IT team as soon as possible.

  • Pop up windows have now started to appear
  • Your browser's homepage has changed
  • Your computer slows down
  • Anti-virus software has become disabled
  • Your system and applications start behaving strangely
  • Unknown programmes start running on your system automatically.

Working in the new `normal`

There is no best way of operating cybersecurity in these times, as every company is different and, of course, every company will have individual approaches to their security procedures.

What we would suggest as minimum requirements are:

  • Carry out regular system backups and perform complete system backups more often.
  • Ensure that all work-related business is carried out through a VPN.
  • Enable automatic updates across all of your systems and networks where possible.
  • Enable the SonicWall firewall and configure the firewall with unique passwords.
  • Turn off WPS and UPnP and turn on WPA2 or WP3.

With the increase in data-driven technologies and the increase in attacks due to potentially reduced IT staffing or the use of insecure networks, maintaining and monitoring your IT security systems and software has never been so important.

Implementing and deploying the right software such as firewalls, anti-virus, anti-malware, spyware, and more help keep your business and teams operating in the safest way possible.

Keeping on top of encryption and patch maintenance and circulating policy controls, and safeguarding company information and data is what SonicWall systems and software do best.

To understand more how we can help support your online security through these times, call us on 0330 1340 230; we'd be happy to help.

Read next post: Managing a centralised and scalable firewall platform

Reference video: UNSW Business School

SonicWall Announce New Gen7 TZ270, TZ370 & TZ470 Series

16/11/2020
by Paul Heritage

The latest SonicWall TZ series, are the first desktop form factor next generation firewalls (NGFW) with 10 or 5 Gigabit Ethernet interfaces. The series consist of a wide range of products to suit a variety of use cases.

Designed for small, mid-sized organizations and distributed enterprise with SD-Branch locations, the 7th generation (Gen 7) TZ series delivers industry-validated security effectiveness with best-in-class price performance. These NGFWs address the growing trends in web encryption, connected devices and high-speed mobility by delivering a solution that meets the need for automated, realtime breach detection and prevention.

New full Gen7 firewall range datasheet: SonicWall TZ270 TZ370 TZ470 TZ570 TZ670 Gen7 TZ Series Datasheet

Popular SonicWall Firewall Configurations

15/11/2020
by Paul Heritage

This article lists all the popular SonicWall configurations that are common in most firewall deployments.

  • Configuring LAN Interface
  • Configuring the WAN (X1) connection
  • Configuring other interfaces (X2, X3 or DMZ etc)
  • Port forwarding to a server behind SONICWALL
  • Configuring remote VPN connections (GroupVPN, GVC, SSL-VPN, L2TP, etc.)
  • Site to Site VPN and Route Based VPN configuration
  • Configuring Wireless
  • Connect via Console
  • Resetting the SonicWall and Uploading firmware
  • Enabling SonicWall Security Services (Content Filter, IPS, GAV, etc.)
  • Configuring user authentication
  • Configuring High Availability
  • Installing GMS/Analyzer

RESOLUTION:

Configuring LAN Interface

Configuring SonicWall DHCP server settings

Configuring the WAN (X1) Interface

Configuring other interfaces (X2, X3 or DMZ etc)

Upgrading to latest Firmware

Port forwarding to a server behind SonicWall

Configuring remote VPN connections. (GroupVPN, GVC, SSL-VPN, L2TP, etc.)

Site to Site VPN and Route Based VPN configuration

Configuring Wireless

Diagnostic tools

Resetting the SonicWall, Diagnostic Files and Uploading firmware

Enabling SonicWall Security Services (Content Filter, IPS, GAV, etc.) and configuring user authentication

CFS:

GAV/IPS/ASW

Capture ATP

Application Firewall:

RBL

Geo-IP:

Configuring user authentication

Configuring High Availability

Installing GMS/Analyzer


Original article: https://www.sonicwall.com/support/knowledge-base/popular-sonicwall-firewall-configurations/170503358114735/

Upgrade your firewall to the latest firmware

17/10/2020
by Paul Heritage

To keep your security appliance updated against known threats you need review and update your current software and firmware. This week SonicWall announced an update to fix a potential issue with SSLVPN.

Please read the attached link and download & apply firmware as detailed.

https://www.sonicwall.com/support/product-notifica...

SonicWall Product Comparison

06/10/2020
by Paul Heritage

Official SonicWall page for comparing the different model groups.

TZ Entry-Level Firewall Compare: https://www.sonicwall.com/tz-entry-level-firewall-series-products-compare-2/

Mid-Range Firewall Comparison: https://www.sonicwall.com/mid-range-products-compare/

‘3 & Free’ Promotion: How to Upgrade Your SonicWall Firewall for Free

05/10/2020
by Paul Heritage

What is the SonicWall ‘3 & Free’ Promotion?

The limited-time SonicWall ‘3 & Free’ promotion is the easy, cost-effective way for customers to upgrade to the very latest SonicWall next-generation firewall appliance for free.

Through Oct. 31, 2020, eligible customers may receive a complimentary NSa 2650, TZ350 or SOHO 250 appliance by purchasing a bundle that includes a three-year subscription of the SonicWall Advanced Gateway Security Suite from their authorized SonicWall SecureFirst partner.

This security suite includes everything you need to stay protected against today’s modern attacks, including advanced malware, ransomware, encrypted threats, viruses, spyware, zero-day exploits and more. This complete service includes:

SonicWall’s exclusive security subscription service also includes SonicWall Real-Time Deep Memory Inspection (RTDMI). A patent-pending technology, RTDMI™ enables Capture ATP to detect and block malware that does not exhibit any malicious behavior or hides weaponry via encryption. This protects your organization from zero-day attacks, malicious PDFs and Microsoft Office files.

https://blog.sonicwall.com/en-us/2020/10/3-and-fre...

How to configure SSL VPN on SonicWall

01/10/2020
by Paul Heritage

SSL VPN license ultimately allows users who are working or operating remotely to connect to internal networks and resources safely and securely through the SonicWall.

Setup of SSL VPN is through the software solutions; SonicWall SSL VPN client, NetExtender, and the SonicWall mobile connect client.

How to configure SSL VPN on SonicWall

Configuring SSL VPN on the 7.X SonicOS

For the address ranges within SSL VPN IP v4, you first need to create your address object.

An administrator will need to log in to your UI firewall management and choose object from the menu.

Look for match objects and addresses, and then click add.

A second window will appear where you can then include the identified range for SSL VPN.

You then need to configure the SSL VPN by navigating to within the server settings to network SSL VPN and opting for SSL VPN status on zones.

From here, you can change SSL VPN access by switching to enable or disable (note, green indicates an active status).

Within the SSL VPN server settings, you then have the option to select domain and SSL VPN port.

(Note: the port option will be required if you connect using the NetExtender and mobile connect methods. The domain will be necessary for the user to gain access to the networks and log in.)

From the client settings – SSL VPN Network, choose default device profile and set the SSL VPN for zone IP v4 and set the address object generated previously as the Network address IP v4.

The tab across the top of the window labelled client routes allows you to manage what levels of network access remote users can be permitted via their connection.

The last tab, client settings, allows administrators to input suffix, WINS, and DNS information and control the caching passwords, behaviour of NetExtender clients, and usernames.

Change create client connection profile to enable and save all changes.

Adding additional SSL VPN users

NetExtender users can authenticate SonicWall for local users, or if they’re listed within a known group, this can be done through LDAP.

To add local users, you need to be within local users and groups, which can be found within devices and users. You can now add new users by simply clicking add.

Moving to the tab labelled groups, click SSL VPN services, and move this across to member of, section.

Moving across to VPN access, you can now add all relevant areas that the user will need access to.

Again, make sure to click save before closing the window.

For the zones of SSL VPN, it’s important to check access rule information.

To do this you need to access, access rules by following policy – rules and policies, then choose SSL VPN – LAN rules. If a user requires access to other zones to obtain resources, this can all be managed in this area by verifying and adding additional access rules as you go.

Configuring SSL VPN for the 6.5 SonicOS

Similar to the SonicOS 7.x, administrators will need to log in to the management platform of SonicWall and within the navigation menu choose manage and then address objects.

From here, click add.

A second window will appear where you now have the option to add your range for SSL VPN.

To configure these settings, click on SSL VPN on the settings page and go to WAN, changing it from red to green to show it is now active.

Now all SSL VPN configurations will be enabled in this particular zone.

You can then set the domain and ports for SSL VPN as you require.

Move across to client settings where, as administrator, you can configure the range of client addresses and NetExtender settings.

For the default device profile, click on configure.

Here you can set the network address v4 IP as your address object from before and set the zone v4 IP as SSL VPN.

The tab labelled client routes will allow administrators to manage the level of access users have to two networks.

It’s essential to set the VPN appropriately as all users will be able to see the routes but may not necessarily be authorised to access all network resources.

In the settings, administrators should also enter all required DNS and WINS data and create client profile connections by enabling this action.

Adding additional users

To add new users, click on users and local users and groups. Within groups, click add SSL VPN services to move the field to member of.

Moving to VPN access, you can then add all the relevant IP addresses and objects identified to the users requirements, in terms of access via NetExtender.

Note: Client routes and VPN access must match for users to have authority to access network resources.

Remember to click save, to save all changes before closing.

SSL VPN zones access rule details

Within access rules, you can access SSL VPN LAN rules with drop-lists available.

Access rules allow access to intended end devices through SSL VPN IPs which are also required for the firewalls to understand that such traffic is allowed through.

You can also test all connections and configurations by installing the SonicWall NetExtender.

Two final points to note:

Remember, within the user’s section of the menu toolbar, you must add in however many users that will have login credentials. Each user then must become a member of SSL VPN services group and have to subnet added to VPN access within the allow list.

In-network interfaces make sure to click on configure on the WAN interface and tick the HTTPS box beside the user login – this helps to minimise login failed attempts occurring when users access SSL VPN via a web portal.

For further information on a SonicWall VPN licence and more call 0330 1340 230, today.

Read the next article: Best Practices for SSL VPNs

Setting up SSL VPN

30/09/2020
by Paul Heritage

SonicWall's security appliance features SSL VPN, providing secure remote access to networks using the NetExtender client.

Below, we outline the steps required to help configure the SonicWall SSL VPN setup, allowing you to run applications securely across your company's network.


Setting up SSL VPN


Accessing NetExtender

Remote users will use NetExtender to access your networks and anything contained within these, i.e., documents, shared files, etc.


Typically users access NetExtender either by clicking on the NetExtender button found when logging in to the virtual office web portal or by launching the NetExtender as a standalone client (once installed, it will remain as a shortcut or within the Start menu making it easy to access after that).


How to setup SSL VPN for SonicOS 7.X

When setting up SonicWall SSL VPN on the latest 7.X firmware, the following instructions should help.


1. With the server settings, look for SSL VPN, Network.


2. Choose SSL VPN status on zones


3. You can choose whether you want and need to disable or enable access to SSL VPN (moving it to a green status means it is active).


4. You then need to move to the server SSL VPN settings. Here choose the port SSL VPN and the desired domain and configure within client settings SSL VPN, Network.


5. With the client settings, SSL VPN, you're able to configure the NetExtender client settings and the client address range information, i.e., which IP's you will provide for those connecting clients and where users can log in from.


6. For the default profile of the device, click on configure.


7. Change the Network IP v4 Address to the address range you inputted in point 5 and set the Zone IP V4 as SSL VPN.


8. Within client routes, you can now control network access for all users, deciding on what can and can't be accessed across the network.


9. The last tab, client settings, is where you can input Suffix, WINS, and DNS information, all while managing usernames, caching passwords, etc.


10. You must enable the create client profile connection for the NetExtender to make a connection and record the server name for the SSL VPN and domain name too.


11. To configure the SSL VPN virtual office's functionality and appearance, you need to use the SSL VPN portal settings page.


12. All SSL VPN users must be part of a user group or SSL VPN services member. To check this and change as appropriate within; device - users – local users and groups.


13. Moving across to VPN access at the top of the screen, you can choose one or more networks from the list, clicking the arrow button to move them directly across to the access list. If you need to change or remove a user's access rights, select the network from the access list and click on the arrow pointing left.


14. Finally, within policy, rules and access rules, set the SSL VPN to LAN rules. And if a user requires access to other zones, you can add and verify these via the access rules page.


SSL VPN setup for SonicOS 6.5

1. Select the SonicWall application and click on manage – SSL VPN settings.


2. To configure these client settings, you need to be on the SSL VPN client settings page where you can input the address range for the client, NetExtender information, and where the users will be able to log in.


3. Within the settings tab, make sure to select both network address IP V4 and Zone IP.


4. To allow the right level of access for users, administrators will need to set this within SSL VPN – client routes page.


5. To configure client settings for the NetExtender, the create client profile connection must be enabled.


6. For the virtual office portal's appearance and functionality, these elements must be configured within SSL VPN – portal settings.


7. Administrators will need to manage users and groups of users through users – local users and moving each member to the appropriate services group. When configuring local users, navigate to manage and system setup – local users and groups, you can then add SSL VPN services. To set local and LDAP user groups, you must edit SSL


VPN services and add the specified user group within the member's tab.


8. Within VPN access, you will see what users can access what networks. You can also add more networks to the access list as required. Of course, these can also be removed by carrying out the same procedure in reverse..


9. Note the new SSL VPN areas within firewall – access rules.


10. SSL VPN zones will auto-create firewall access rules; however, these can be modified, allowing access to only those users that have been configured.


11. Administrators should follow manage – network – interfaces, and within the WAN interface, administrators must ensure HTTPS is enabled.


Both of these SonicWall SSL VPN setup procedures can be tested via users through the SonicWall's public IP – always recommended.

Protecting your business during a global crisis

24/09/2020
by Paul Heritage

COVID19 has had a dramatic effect on the world. With companies changing the way they operate and work and teams are looking at different ways to communicate and access information.

A business’s focus during this time is on how they will continue to operate. And in all instances, people ultimately need access to the tools and information to help them get the job done.




To help keep businesses running and operating as smoothly as possible, we take a look at some of the best practices for businesses and why they're so important when protecting the business from a global health crisis.


A firewall approach to a global health crisis

During the Coronavirus pandemic, each country has taken its own approach to protect its people.


Countries like Japan have almost used the technological concept of firewalls and built their own manmade firewall around their cities. They were restricting travel, placing quarantine restrictions on areas, and limiting the volume of people coming in and out of the country.


Japan's focus was to create a firewall that blocked the Coronavirus's inflow, just like a firewall blocks malware accessing its networks and spreading.


However, as Japan found out, firewalls have to be robust, with no room for error or indeed holes in the system.


So, what can businesses of all shapes and sizes do to protect their online networks further?


Protecting business during the global crisis

1. Make sure you have a robust business continuity plan

Your business continuity plan is not just a nice to have; it's a must-have. It should be a plan covering everything from adverse weather conditions to cyber-attacks, global pandemics, and more! It's advisable that these plans are checked and played out (to some extent) annually and should account for all business areas, including infrastructure, technology, communication, etc.


2. Securely expand remote working

Remote working is not a new concept; however, having your entire workforce working remotely is unique! The problem that most businesses have come across when expanding their remote working capabilities is that they don't have enough VPN (a virtual private network) licences to accommodate everyone.


This can be a risky place to be in, not only because your employees no longer have access to information and applications needed to do their jobs, but you also run the risk of employees trying to access networks via non-secure connections.


The solution?


Businesses need to look at scalable, secure remote access solutions that can easily cope with an increase in users should the need ever arise.


3. Watch out for fear-based cyber attacks

Fear-based cyber campaigns are common among cybercriminals, and organisations must ensure that they have high or increased email security levels in place to help mitigate these cyber fear attacks.


Office 365 security, cloud application security, and endpoint protection solutions should all be implemented to prevent phishing attacks compromising networks.


4. Look after your endpoints

With more people working remotely, businesses must look at proactive endpoint protection that prevents attacks before, during, and after their execution.


Why cybersecurity matters now more than ever

We have an increased dependency on digital infrastructures. Today the internet and its many communication channels have become the only method (at times) for social/human interaction.


With more work from home policies coming into effect than ever before, workforces have been confined to social media posts, video calls, chat programmes, etc.


With this in mind, a cyberattack now, of any sort, on an organisation's network or across a family's devices would be devastating. Not only because of what the attack could cost you financially but because of what it can do to our mental well-being as all communication is lost.


Fear. As we've mentioned previously, cybercriminals are renowned for exploiting human weakness and thrive in the knowledge that people will, unfortunately, make more mistakes in times of global crisis. We need to be careful whom we trust with our data online.


For example, a recent cyber-attack occurred, which centred on a map that seemed to display Coronavirus statistics. However, Malware was concealed in this download, which then ran a malicious application on the computer and allowed hackers to access passwords and more.


Staying safe online

It's important to remember some best practice points when working from home or when looking at increasing your level of security online:


  • Make sure you have a long, complex router password
  • Check all firewalls are active on your router
  • Don't reuse passwords across the internet
  • Use only reliable VPN when accessing anything online
  • Don't click links within emails that you're unsure of
  • Be careful whom you give your details to
  • Be sure to check the source of all URLs and ensure all apps and programmes you download are the original versions
  • Update your system software and applications regularly.

Software for business protection

SonicWall-Sales firewalls help to provide the critical security business solutions that organisations need, now.


Also, providing remote connectivity, cloud application security, and endpoint protection, make sure to call the team to find out how SonicWall can help keep your business safe now and during a global crisis.

How your SonicWall Firewall can protect you against even the worst cyber attacks

10/09/2020
by Paul Heritage

Most people who are using some form of device connected online will have had, or fallen victim to a data breach, where their personal information has been compromised.

2020 has put the world in an uncompromising position as offices close and remote working and working from home becomes the norm.




Unfortunately, with this, there is also an increase in the risk of cyber-attacks and, most definitely, data security breaches.


Below, we take a look at those 2019 cyber-attacks that, while not the biggest, had the most considerable impact, and just what measures you can put in place to prevent them from happening again.


Cyber Attacks we must learn from

Fortnite

With the gaming sector bigger than Hollywood and the music industry combined, it fast became a high-profile cyber target. And in 2019, the popular game, Fortnite, suffered a large-scale cyber-attack.


Hackers took their opportunity when a vulnerability was found in the games login systems. At this stage, hackers were able to impersonate actual players, view game details, chats, and purchase currency, which could then be moved to their own accounts.


Of course, this issue was quickly rectified; however, the volume of people affected and impacted by the hack is huge.


Georgia Institute of Technology

Unfortunately, Georgia Tech found a vulnerability in its web application a little too late. It was reported that cybercriminals gained access to a personnel database containing 1.3 million individuals, both students, and staff, personal data.


Quest Diagnostics

An awful breach in 2019 that resulted in the loss of a considerable volume of medical data – Quest Diagnostics was identified as being the biggest single breach in this category, with 11.9 million patients affected.


The data stolen included patients' credit card details, medical information, and personal identity information – all adding to the cybercriminals armour ready for blackmail and identity theft purposes.


Toyota

Toyota faced a serious hacking attack in April 2019, when 3.1 million customers and employees had their personal information stolen. Names, birth dates, and more were all taken when hackers gained access to Toyota's internal computer systems.


Facebook

How could we forget about Facebook with all of the daily media reports! As a social networking platform, Facebook is constantly under review, and when not one, but two breaches related to privacy were detected in 2019, we fast saw Facebook users (approx. 2 million) have their personal information exposed.


The silver lining is that these particular vulnerabilities weren't uncovered by cybercriminals but rather researchers looking for security flaws.


First American

First American experienced a big blunder when they found out in April that 885 million customer records were available on their website for simply anyone to steal. With information dating back to 2003, records included customer's social security numbers, driving licence details, financial data, and more!


Magecart

A malware attack that was widely distributed throughout 2019, Magecart affected an estimated 18,000 web hosts! This piece of malware hijacked the online cart systems that people use when making an online purchase—stealing people's financial details throughout the process.


Choice Hotels

Choice Hotels fell victim to ransomware back in August 2019 when approximately 700,000 customer records were accessed. A ransom note placed over the server demanded Choice to pay in Bitcoins for the stolen data's safe return.


Canva

Australian company Canva was targeted in May by cybercriminals who claimed they had accessed over 139 million users' details, which they were planning on selling on the dark web!


Taking Action

The failure to patch a known vulnerability, in a timely fashion, can have severe consequences. Not only this, but unsecured databases that are left exposed online are also a significant problem.


Learning from our experiences, we understand that data breaches and cyber-attacks can come in various forms.


We also know that, unfortunately, cyber-attacks aren't going anywhere fast, which means for businesses and individuals, we need to look to increase and take charge of our cybersecurity now.


Ideally, taking a layered and robust approach to cybersecurity is required today, as is real-time cyber-attack detection and robust prevention platforms, like the


SonicWall Firewall systems.


Best practice for tackling cybercrime includes:


  • Scaling your cybersecurity throughout all networks (wired, wireless, and mobile).
  • Using firewalls to fight against advanced cyberattacks.
  • Put in place cybersecurity layering measures with sandboxing, ideally opting for SonicWall Security.
  • Implement robust email controls to prevent phishing attempts.
  • Plan your network data.

And most importantly…


According to research by IBM, the cost of an average data breach can be up to $3.92 million with FireEye reporting that just under half of all businesses are prepared to face a cyber-attack or data breach.


Businesses must protect their data now more than ever. Let SonicWall help you.


Call 0330 1340 230.



y

SonicExpress Mobile Application

17/08/2020
by Paul Heritage

TZ570 and TZ670 Series firewall customers now have a new way to ease and enhance their onboarding experience.

For most of us, mobile devices are becoming the go-to means for getting work done in a digitally connected world. By 2023, the number of mobile device users will increase to 7.33 billion — and by 2025, 72% of those accessing applications and the web will do so with smartphones alone.

Network admins are also utilizing mobile devices to get work done: These devices allow them to extend their presence, enabling faster responses and easier network configuration and setup.

As part of our commitment to anytime, anywhere cybersecurity, SonicWall is launching the SonicExpress mobile app. The SonicExpress mobile app greatly simplifies firewall onboarding: device registration, initial setup, basic configuration, and monitoring for 7th generation SonicWall firewalls, including the recently launched TZ670 and TZ570 series. Designed for the Apple and Android platforms, the SonicExpress app is now available for download from the Apple App Store and the Google Play Store.

Onboarding as easy as 1, 2, 3

The typical onboarding process involves appliance registration and several other steps that must be completed in order to get a new firewall ready for configuration and use. With SonicExpress, the onboarding experience of a new firewall involves just three simple steps:

  1. Launch the SonicExpress App on a mobile device
  2. Connect a mobile device USB cable to the new firewall
  3. Finish setup

Designed with intuitive interfaces, the SonicExpress app guides the user through device registration and initial setup in less than a minute.

Simplified initial firewall setup

Zero-touch deployments require firewalls to connect to the internet using a DHCP address on the WAN interface. However, in certain deployments, WAN interfaces are assigned static IP addresses or configured over a PPPoE interface. For closed network deployments, there is typically no internet connectivity for the firewall being set up. The app helps with these and other initial setup configurations by connecting the firewall using the USB interface.

The SonicWall Express Setup Guide walks users through the process of getting their firewall registered and set up for specific deployment use cases. Alternately, users can choose to register the firewall without going through the entire setup process by simply scanning a QR code.

Monitoring your firewall

The SonicExpress app allows users to monitor firewalls for threat alerts, resource utilization and system status via an intuitive dashboard. It offers the flexibility of being able to check the health of your network from anywhere and the convenience of being able to make easy, quick changes necessary to ensure the security posture of your network.

There’s more coming

This is just the initial release of the app — we’ll be adding more features in future releases, including firmware management and advanced configuration capabilities similar to those available on the web management interface.

For a firsthand look at the new SonicExpress App, you can download it directly from the Apple App Store or Google Play Store.